General

  • Target

    2024-04-20_00a61e9f0fadce92b909d7dd73f6f0bf_cryptolocker

  • Size

    49KB

  • MD5

    00a61e9f0fadce92b909d7dd73f6f0bf

  • SHA1

    6872b33d352765394119dbf7ea0e8622b5865d9e

  • SHA256

    75d40527a7b3790f7daf73d54bf3fd10e6921da6b45a42400faebf61da2df960

  • SHA512

    d2a9cf12b886e1a4d6de1d8cf2a2d1a1c3d8ad3b1cc216a67119f795be103b321df02f600bed3c49c8f1b93dce0f02b75b67dc239596674a15785f4f20115112

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocc:qmbhXDmjr5MOtEvwDpj5cDtKkQZQB

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_00a61e9f0fadce92b909d7dd73f6f0bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections